Browsing by Author "Yang, Xinyu"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
- Phytophthora sojae Avirulence Effector Avr3b is a Secreted NADH and ADP-ribose Pyrophosphorylase that Modulates Plant ImmunityDong, Suomeng; Yin, Weixiao; Kong, Guanghui; Yang, Xinyu; Qutob, Dinah; Chen, Qinghe; Kale, Shiv D.; Sui, Yangyang; Zhang, Zhengguang; Dou, Daolong; Zheng, Xiaobo; Gijzen, Mark; Tyler, Brett M.; Wang, Yuanchao (PLOS Pathogens, 2011-11-10)Plants have evolved pathogen-associated molecular pattern (PAMP)-triggered immunity (PTI) and effector-triggered immunity (ETI) to protect themselves from infection by diverse pathogens. Avirulence (Avr) effectors that trigger plant ETI as a result of recognition by plant resistance (R) gene products have been identified in many plant pathogenic oomycetes and fungi. However, the virulence functions of oomycete and fungal Avr effectors remain largely unknown. Here, we combined bioinformatics and genetics to identify Avr3b, a new Avr gene from Phytophthora sojae, an oomycete pathogen that causes soybean root rot. Avr3b encodes a secreted protein with the RXLR host-targeting motif and C-terminal W and Nudix hydrolase motifs. Some isolates of P. sojae evade perception by the soybean R gene Rps3b through sequence mutation in Avr3b and lowered transcript accumulation. Transient expression of Avr3b in Nicotiana benthamiana increased susceptibility to P. capsici and P. parasitica, with significantly reduced accumulation of reactive oxygen species (ROS) around invasion sites. Biochemical assays confirmed that Avr3b is an ADP-ribose/NADH pyrophosphorylase, as predicted from the Nudix motif. Deletion of the Nudix motif of Avr3b abolished enzyme activity. Mutation of key residues in Nudix motif significantly impaired Avr3b virulence function but not the avirulence activity. Some Nudix hydrolases act as negative regulators of plant immunity, and thus Avr3b might be delivered into host cells as a Nudix hydrolase to impair host immunity. Avr3b homologues are present in several sequenced Phytophthora genomes, suggesting that Phytophthora pathogens might share similar strategies to suppress plant immunity.
- PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning ModelsKo, Myeongseob; Yang, Xinyu; Ji, Zhengjie; Just, Hoang Anh; Gao, Peng; Kumar, Anoop; Jia, Ruoxi (ACM, 2023-10-16)Machine learning (ML) models can expose the private information of training data when confronted with privacy attacks. Specifically, a malicious user with black-box access to a ML-as-a-service platform can reconstruct the training data (i.e., model inversion attacks) or infer the membership information (i.e., membership inference attacks) simply by querying the ML model. Despite the pressing need for effective defenses against privacy attacks with black-box access, existing approaches have mostly focused on enhancing the robustness of the ML model via modifying the model training process or the model prediction process. These defenses can compromise model utility and require the cooperation of the underlying AI platform (i.e., platform-dependent). These constraints largely limit the real-world applicability of existing defenses. Despite the prevalent focus on improving the model’s robustness, none of the existing works have focused on the continuous protection of already deployed ML models from privacy attacks by detecting privacy leakage in real-time. This defensive task becomes increasingly important given the vast deployment of MLas- a-service platforms these days. To bridge the gap, we propose PrivMon, a new stream-based system for real-time privacy attack detection for ML models. To facilitate wide applicability and practicality, PrivMon defends black-box ML models against a wide range of privacy attacks in a platform-agnostic fashion: PrivMon only passively monitors model queries without requiring the cooperation of the model owner or the AI platform. Specifically, PrivMon takes as input a stream of ML model queries and provides an efficient attack detection engine that continuously monitors the stream to detect the privacy attack in real-time, by identifying self-similar malicious queries. We show empirically and theoretically that PrivMon can detect a wide range of realistic privacy attacks within a practical time frame and successfully mitigate the attack success rate. Code is available at https://github.com/ruoxi-jia-group/privmon.
- ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and ManagementGao, Peng; Liu, Xiaoyuan; Choi, Edward; Ma, Sibo; Yang, Xinyu; Song, Dawn (ACM, 2023-11-19)Open-source cyber threat intelligence (OSCTI) has become essential for keeping up with the rapidly changing threat landscape. However, current OSCTI gathering and management solutions mainly focus on structured Indicators of Compromise (IOC) feeds, which are lowlevel and isolated, providing only a narrow view of potential threats. Meanwhile, the extensive and interconnected knowledge found in the unstructured text of numerous OSCTI reports (e.g., security articles, threat reports) available publicly is still largely underexplored. To bridge the gap, we propose THREATKG, an automated system for OSCTI gathering and management. THREATKG efficiently collects a large number of OSCTI reports from multiple sources, leverages specialized AI-based techniques to extract high-quality knowledge about various threat entities and their relationships, and constructs and continuously updates a threat knowledge graph by integrating new OSCTI data. THREATKG features a modular and extensible design, allowing for the addition of components to accommodate diverse OSCTI report structures and knowledge types. Our extensive evaluations demonstrate THREATKG’s practical effectiveness in enhancing threat knowledge gathering and management.